Computer Security Institute

Results: 1676



#Item
131Heuristics / Nuclear safety / Global Initiative to Combat Nuclear Terrorism / Terrorism / Law enforcement / Crime / Computer forensics / Department of Defense Cyber Crime Center / Nuclear terrorism / Criminology / Forensic science

Forensics in Nuclear Security by the Netherlands Forensic Institute Combating the threat of nuclear terrorism

Add to Reading List

Source URL: www.forensicinstitute.nl

Language: English - Date: 2014-08-16 02:33:17
132

From Zygote to Morula: Fortifying Weakened ASLR on Android Byoungyoung Lee† , Long Lu‡ , Tielei Wang† , Taesoo Kim∗ , and Wenke Lee† † School of Computer Science, Georgia Institute of Technology

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2014-04-21 13:48:10
    133

    Royal Institute of Technology Dept. of Numerical Analysis and Computer Science Network Application Security Using The Domain Name System

    Add to Reading List

    Source URL: josefsson.org

    Language: English - Date: 2012-09-11 01:50:32
      134

      Analysis of Payment Transaction Security in Mobile Commerce Seema Nambiar, Chang-Tien Lu Department of Computer Science Virginia Polytechnic Institute and State UniversityHaycock Road, Falls Church, VAfsnam

      Add to Reading List

      Source URL: europa.nvc.cs.vt.edu

      Language: English - Date: 2007-03-30 15:36:21
        135Computer network security / Technology / Royal Institute of Technology / Information security / Network security / SCADA / Wireless security / Computer security / National Security Agency / Security / Crime prevention / National security

        Sammanställning forskning.xlsx

        Add to Reading List

        Source URL: www.informationssakerhet.se

        Language: English - Date: 2013-04-22 10:50:28
        136Computer network security / Internet protocols / Phishing / Social engineering / Spamming / DNS spoofing / Intrusion detection system / Domain Name System / Database / Computing / Cybercrime / Internet

        Poster: “Quilt: A system for distributed queries of security-relevant data” Dr. Timothy Shimeall and George M. Jones and Derrick H. Karimi CERT/Software Engineering Institute Carnegie-Mellon University Pittsburgh, Pe

        Add to Reading List

        Source URL: www.ieee-security.org

        Language: English - Date: 2013-05-17 10:01:51
        137Max Planck Institute for Software Systems / Max Planck Institute for Computer Science / University of California /  Berkeley / Max Planck Society / Saarland University / National Institute for Research in Computer Science and Control / University of California / Microsoft Research / Privacy / Association of Public and Land-Grant Universities / Ethics / California

        Monday, 18 May:30–8:45 Opening 8:45–10:15 Attacks and Defenses Tuesday, 19 May 2009

        Add to Reading List

        Source URL: www.ieee-security.org

        Language: English - Date: 2009-05-31 21:45:48
        138Computer security / Denial-of-service attack / Transmission Control Protocol / Traffic flow / Deep packet inspection / Secure Shell / Sliding window protocol / Port knocking / Deep content inspection / Computer network security / Computing / Cyberwarfare

        Flow-based Brute-force Attack Detection Martin Draˇsar, Jan Vykopal Masaryk University Institute of Computer Science Botanick´a 68a, Brno, Czech Republic Philipp Winter

        Add to Reading List

        Source URL: www.cs.kau.se

        Language: English - Date: 2014-05-26 09:37:41
        139Ethics / English languages / Internet ethics / Law / Privacy / Computer security / Institute of Electrical and Electronics Engineers / Internet privacy / Information security / Security / Crime prevention / National security

        CENTENNIAL SECTION PROLOG Prolog to the Section on Privacy and Cybersecurity BY C ARL L ANDWEHR , Senior Member IEEE The ancient word Bsecurity[ originated from the Latin securitas, meaning freedom from anxiety or care,

        Add to Reading List

        Source URL: www.landwehr.org

        Language: English - Date: 2014-08-19 07:15:29
        140Standards for Security Categorization of Federal Information and Information Systems / Government procurement in the United States / Federal Information Security Management Act / Procurement / National Oceanic and Atmospheric Administration / Business / Government / Management / Computer security / National Institute of Standards and Technology / Military acquisition

        Acquisition AlertSupply Chain Risk Management for Acquiring High and Moderate lmpact Information Systems

        Add to Reading List

        Source URL: www.ago.noaa.gov

        Language: English - Date: 2015-06-02 22:02:09
        UPDATE